Delay-minimal Transmission for Energy Constrained Wireless Communications
|
|
- Avice Joseph
- 6 years ago
- Views:
Transcription
1 Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 Abstract We investigate the problem of minimizing the overall transmission delay of data packets in a single-user wireless communication system, where the transmitter has a fixed amount of energy to transmit all of the data packets. We consider two different scenarios. In the first scenario, we assume that packets arrive randomly at the transmitter. We propose two different approaches to solve this problem. First, we develop an iterative algorithm that allocates the total energy of the transmitter to its individual packets, in a way to minimize the total delay. As a second approach, we develop a dynamic programming formulation for the problem. In the second scenario, we assume that all of the packets have already arrived before the transmission starts. In this situation, the cost function has a fixed form, and is convex and differentiable. In this scenario, the iterative algorithm we develop is guaranteed to converge to the unique global optimal solution. I. INTRODUCTION For many wireless networks, especially for sensor and mobile ad-hoc networks, efficient consumption of energy is a critical issue, since energy is severely limited in such networks, and is even non-renewable in some cases. Consequently, a plethora of energy efficient methods and algorithms have been developed under various system settings and for various optimality criteria. Reference [1] considers the problem of minimizing the energy used in transmitting packets in a single-user system subject to a deadline by which all packets must be transmitted. It develops an algorithm, coined lazy scheduling algorithm, where the transmission time of each packet is increased as much as possible, subject to the deadline and causality constraints i.e., all packets must be transmitted by a deadline and a packet may not be transmitted before it arrives), in order to minimize the total energy consumed in transmitting the packets. In [2], the authors extend the single-user problem to a multi-user case and develop an iterative algorithm. The algorithm is named MoveRight where at any iteration only two consecutive packets are considered, and the starting points of the transmission of the two packets are moved to the right hence the name). The authors prove that this algorithm converges to the optimal scheduling of the packets that minimizes the total energy. In [3], the authors extend their energyminimizing approaches to wider scenarios, such as multipleaccess and broadcast channels, and to channels with fading. This work was supported by NSF Grants CCF , CCF , CNS and CCF Dynamic programming DP) is another approach which has been broadly adopted in wireless optimal power/energy allocation problems. In [4], the authors use DP to jointly optimize the long-term average transmission power and average buffer delay. Reference [5] proposes a DP formulation to find optimal power, channel coding and source coding policies with a delay constraint. Reference [6] uses DP to maximize the K- block constrained capacity through adaptively allocating power across blocks according to the varying channel condition. Reference [7] uses DP to calculate the optimal power/rate control policies to minimize the average delay under an average power constraint. Reference [8] uses DP to solve the problem of maximizing the data throughput for an energy- and deadline-constrained transmitter over a fading channel. In this paper, we consider the dual of the problem considered in [1]. For a single-user system, our objective is to minimize the overall delay of the packets subject to an energy constraint on the transmitter. The delay includes both the queuing time and the transmission time for the packet. Our aim is to allocate the total energy over all packets in a way to minimize the overall delay of the system. We investigate two different settings. In the first setting, we assume that the packets arrive randomly during the transmissions, while in the second setting, we assume that all of the packets have arrived and are ready for transmission before the transmission starts. We formulate both problems as convex minimization problems. However, we see that there are important structural differences between the two problems. In the first setting, even though the overall cost function is convex in the energies allocated to the packets, it is not differentiable. The reason for this is that the cost function takes different forms in different regions of allowable energy distributions. In other words, the energy allocated to a packet affects the form of the cost function for later packets. In the second setting, the cost function is convex, has a fixed form, and is differentiable. For the first setting, unlike [1], our problem does not admit a closed-form solution. Therefore, we develop an iterative algorithm that is based on the principle of decreasing the overall delay at each iteration. We prove that the proposed algorithm decreases the overall delay monotonically. However, due to the non-differentiability of the overall delay function, the proposed algorithm may converge to a suboptimal fixed point. In order to overcome this problem, we use two modifications on our algorithm: increasing the dimensionality of the sub-problem solved at each iteration i.e., considering more than two packets at any given iteration),
2 d 3 d M 1 t 1 t 2 t 3 t 4 t M 1 D M 1 t M D M Fig. 1. System model with random packet arrivals. and ɛ-perturbation of the sub-optimal fixed points. In addition, we develop a DP based formulation for the same problem. For the second setting, we formulate the standard Lagrangian based approach, and also develop an iterative algorithm. Since the cost function has a fixed form and is differentiable, the iterative algorithm is guaranteed to converge to the unique global optimum solution. II. SCENARIO I: RANDOM PACKET ARRIVALS We consider a non-fading single-user wireless channel. We assume that M packets arrive at the transmitter randomly at times t 1, t 2,, t M, where the inter-arrival times are denoted as,,, d M 1 ; see Fig. 1. The transmitter has a total energy constraint which is denoted by E. Let e i denote the energy allocated for the transmission of packet i, then M e i E. Since the channel is non-fading, we can express the relationship between the transmission duration of τ i and the energy spent in its transmission e i, for packet i, as a deterministic function τ i = fe i ). Without loss of generality, as in [1], [3], we assume that fe) satisfies the following properties: i) fe) 0, ii) fe) decreases monotonically in e, iii) fe) is strictly convex in e, iv) fe) is continuously differentiable, and v) fe) as e 0. As shown in [1], [3], the first four conditions are satisfied in realistic channel coding schemes. The last condition is reasonable as a packet cannot be transmitted with zero energy. Let D i denote the delay experienced by the i-th packet, which includes the waiting time in the queue and the transmission time. Then, the delay experienced by each packet can be written recursively as, = fe 1 ) = ) + + fe 2 ) = ) + + fe 3 ). D M = D M 1 d M 1 ) + + fe M ) 1) where x) + = max0, x). Here, for the i th packet, D i 1 d i 1 ) + denotes the waiting time in the queue, and fe i ) denotes the actual transmission time. Then, we can express our optimization problem as min D i e i E e i 0, i = 1, 2,, M 2) where the parameters of the optimization are the energies allocated to all packets, {e i } M, and the givens of the optimization problem are the total energy E and the inter-arrival times of the packets {d i } M. Intuitively, the optimization problem in 2) is a convex optimization problem since function fe i ) is convex and a linear combination of convex functions is convex. However, the existence of ) + function complicates matters, and the joint convexity of the cost function with respect to all e i, i.e., with respect to e = [e 1 e 2 e M ] needs to be proved. Theorem 1: The objective function in 2) is convex with respect to e. Proof: We will prove the convexity recursively. First, we note that = fe 1 ) and fe 1 ) is convex in e 1. We also note that = fe 1 ) ) + + fe 2 ) and the function fe 1 ) ) + is convex in e because of the convexity of the function fe 1 ) in e 1. Thus, is convex in e also. ) + Then, we look at = fe 1 ) ) + + fe 2 ) + fe 3 ). We let F e) = fe 1 ) ) + + fe 2 ). We note that F e) itself is convex in e, and we need to prove that F e)) + is convex in e as well. Using the definition of ) +, for any two vectors e and e in the constraint set, we have λf e) λ)f e ) + λf e) + 1 λ)f e ) If F λe + 1 λ)e ) is positive, we have F λe + 1 λ)e ) 3) λf e) λ)f e ) + F λe + 1 λ)e ) = F λe + 1 λ)e ) + 4) If F λe+1 λ)e ) is negative, then F λe+1 λ)e ) + = 0. Using the nonnegativity of the ) + function, we have λf e) λ)f e ) + 0 Therefore, using 4) and 5), we conclude that = F λe + 1 λ)e ) + 5) λf e) λ)f e ) + F λe + 1 λ)e ) + 6) which implies that F e)) + is convex in e. Therefore, is convex in e as well. The convexity of D i d i ) + for i = 4,, M 1 can be proved in a similar manner. Since the objective function can be expressed as M 1 D i = D i d i ) + + fe i ) 7) and since each term in the cost function is convex in e, the linear combination is convex in e as well. Therefore, our problem is a convex minimization problem which has a convex objective function and linear constraints. However, there are two main difficulties in this optimization
3 problem. First, since the overall delay includes both the queuing time and the transmission time of the packets, the transmission time for a packet affects the queuing time of all of the following packets. This causes the queuing time of earlier packets to be multiply counted in the objective function. This leads to the varying coefficients before fe i ) s in the cost function, which implies that the convexity of f ) alone will not provide us a closed-form solution; we note that the convexity of the cost function alone provided a closed-form solution in [1] due to the symmetry in the cost function. Secondly, because of the existence of ) + function in the overall delay expression, the cost function has nondifferentiable points. In addition, depending on whether the insides of ) + functions are negative or positive, we have 2 M possible cost functions. Since the number of different cost functions to consider grows exponentially with the number of packets, standard Lagrangian method is not tractable here. In the following, we will use a simple 3-packet problem to illustrate the difficulties involved in solving this convex optimization problem. Using the definition of D i in 1), the 3-packet problem is min fe 1 ) + f e 1 ) ) + + fe 2 ) + f e 1 ) ) + + fe 2 ) ) + + fe3 ) e 1 + e 2 + e 3 E, e 1, e 2, e 3 0 8) Opening the parentheses, we have four different possible cases: Case 1: Both the transmission of the first and second packets end before the arrival of the next packet, i.e., insides of both ) + functions are negative. This case is illustrated in Fig. 2. In this case, we have min fe 1 ) + fe 2 ) + fe 3 ) fe 1 ), fe 2 ) e 1 + e 2 + e 3 E, e 1, e 2, e 3 0 9) Case 2: The transmission of the first packet ends after the arrival of the second packet, while the transmission of the second packet ends before the arrival of the third packet. This case is illustrated in Fig. 3. In this case, we have min 2fe 1 ) + fe 2 ) + fe 3 ) fe 1 ) >, fe 1 ) + fe 2 ) + e 1 + e 2 + e 3 E, e 1, e 2, e ) Case 3: The transmission of the first packet ends before the arrival of the second packet, while the transmission of the second packet ends after the arrival of the third packet. This case is illustrated in Fig. 4. In this case, we have min fe 1 ) + 2fe 2 ) + fe 3 ) fe 1 ), fe 2 ) > e 1 + e 2 + e 3 E, e 1, e 2, e ) Case 4: The transmissions of both the first and the second packets end after the arrival of the next packet. This case is Fig. 2. Case 1. Fig. 3. Case 2. illustrated in Fig. 5. In this case, we have min 3fe 1 ) + 2fe 2 ) + fe 3 ) 2 fe 1 ) >, fe 1 ) + fe 2 ) > + e 1 + e 2 + e 3 E, e 1, e 2, e ) As we see, the sub-problems in 9), 10), 11) and 12) are similar in structure, except for different coefficients in front of the transmission delay times, fe i ), in the cost function. In addition, each problem has a different constraint set, which are all convex due to the monotonicity of fe i ) in e i. In order to solve the optimization problem in 8), we need to solve the four optimization problems in 9), 10), 11) and 12), and take the solution that gives us the smallest cost function, i.e., overall delay. Even though each problem is differentiable and convex, the number of problems to be solved increases exponentially with the number of packets, making this approach intractable for practical scenarios with many packet arrivals. A. An Iterative Approach Because of the intractability of the global problem, in this section, we consider developing an iterative algorithm, which at any given iteration, considers a smaller local sub-problem. Similar to the FlowRight algorithm developed in [3], in this section, we consider optimizing two of the variables, the energies allocated to two consecutive packets, at any iteration, when the rest of the variables, the energies allocated to the rest of the packets, are fixed. Initially, we allocate the total energy E to the first packet. Then, we consider the first two packets, and optimize the distribution of the total energy E over these two packets, in a way to minimize the overall delay, while we keep the energies allocated to the rest of the packets fixed. We continue this process until we reach the last packet, then we return to the first packet. We express the local optimization problem in terms of the energies of two consecutive packets, as follows min D j e k i, e k i+1) j=i e k i + e k i+1 = e k 1 i + e k 1 i+1, ek i, e k i ) where e k 1 i and e k 1 i+1 denote the energies of the packets in the previous iteration. This problem can be solved relatively easily as it essentially is a single-variable optimization problem. It is easy to prove that this algorithm converges to a fixed point, since the algorithm monotonically decreases the cost
4 d n 1 2 Fig. 4. Case 3. Fig. 5. Case 4. function which is lower bounded by zero. If the objective function was twice-differentiable, we could be sure that the algorithm converges to the globally optimum solution. Since our cost function is not differentiable at some points, the algorithm may converge to a strictly sub-optimal fixed point. Reference [9] proposes two approaches to solve the difficulty introduced by non-differentiability in network flow problems: multiple node relaxation method, and ɛ-relaxation method. We adopt these two methods here in order to escape sub-optimal fixed points. Following multiple node relaxation method, we consider sub-problems involving three or more packets, as opposed to two packets as we have done above. Similarly, following the ɛ-relaxation method, we move a small amount of energy from one packet to another to perturb a suboptimal fixed point. Experimentally, we have observed that both methods improve the convergence of the algorithm. B. A Dynamic Programming Approach In this section, we develop a DP approach to our delay minimization problem. In particular, we partition the problem into M stages, and define the state space to be E A, where E includes the possible amounts of energy remaining at the current stage and A is the set of possible queuing times associated with the packet. Specifically, in stage n, we define S n e, a) to be the minimal delay for the last M n packets, given the total energy remaining is e and the waiting time in the queue for the n-th packet is a, as shown in Fig. 6. Then, we have the following recursive relationship S n e, a) = min {a + fe n) 0 e n e +S n+1 e en, a + fe n ) d n ) +)} 14) for n = 1, 2,, M 1, and S M+1 e, a) = 0. During the process of solving the recursive equations backwards, we keep track of e n that leads to the minimum value. Let us denote the minimizing values as ê n e, a) for n = 1, 2,, N. After computing the functions {S n e, a), 0 e E} in a backward recursion and obtaining the ê n e, a), we get the optimal energy allocation strategy as e 1 = ê 1 E, 0). For n = 2,, N, a n = a n 1 + fe n 1 ) d n 1 ) + ) n 1 e n = ê n E e i, a i 15) Fig. 6. a n fe n ) a n+1 System model for the dynamic programming approach. Since getting a closed form solution for the recursive equations appears to be intractable, we perform numerical approximation instead. To this end, we quantize the state space into a finite number of discrete states. The step size of the quantization decides the size of the state space. Specifically, if there are N levels for the energy and J levels for the waiting time, for each packet we have N J different states. The number of evaluations of a + fe n ) + S n+1 [e e n, a + fe n ) d n ) + ] is once per quantized e n for each quantized state for each stage. Thus, the number of basic evaluations is N 2 JM, and the number of calculations grows linearly with the total number of packets M. We note that we can use the DP approach for more general cases where the packet arrivals are modeled as a random process, and the delays are calculated as expectations. In addition, we can incorporate the fading nature of the wireless channel, as well as develop online algorithms. III. SCENARIO II: PACKETS READY BEFORE TRANSMISSION STARTS In many situations, such as multimedia communications, the source video, music, etc.) may be available at the server waiting to be downloaded to their destinations. In sensor networks, a node may have gathered a number of packets before the transmission starts. In these scenarios, minimizing the overall transmission delay with a given amount of energy is also an important problem. We assume that there are M packets available at the transmitter at t = 0; see Fig. 7. Therefore, for the i-th packet, the delay D i can be expressed as i i D i = τ k = fe k ) 16) k=1 k=1 Then, our optimization problem becomes min M i + 1)fe i ) e i E e i 0, i = 1,, M 17) We note that, since all the packets have arrived before the transmission starts, the cost function has a fixed form, and we do not need to use the ) + function. This makes the optimization problem tractable. The problem in 17) is a convex optimization problem, and there exists a unique global optimum solution that satisfies the KKT optimality conditions. We note that because of property v) of fe), no e i can be zero, as it would require the cost function to go to infinity. As a result, the KKTs can be expressed as M i + 1)f e i ) + λ = 0 18)
5 Fig. 7. starts. i.e., as fe 1 ) fe 2 ) fe 3 ) System model when all packets are ready before the transmission ) e i = f 1 λ, i = 1, 2,, M 19) M i + 1 where λ is the non-negative Lagrange multiplier which is chosen such that i k=1 e k = E. In the following, we also devise an iterative algorithm to solve this problem. Following the procedure described in the previous section, considering two variables at a time, the local optimization in the k-th iteration becomes min M i + 1)fe k i ) + M i)fe k i+1) e k i + e k i+1 = e k 1 i + e k 1 i+1, ek i, e k i ) Following a similar analysis as before, we know that e k converges to a fixed point, ē, as the cost function is monotonically decreasing and is lower bounded. We need to show that ē is the solution to 17). From the KKTs of the local optimization, we have Mf ē 1 ) = M 1)f ē 2 ) = = f ē M ) 21) We also have M ēi = E. Therefore, ē satisfies the global KKT conditions in 18) and is the globally optimal point. Based on the properties of fe), we know that f e) is negative and monotonically increasing in e. From 21), we have f ē 1 ) > f ē 2 ) > > f ē M ). Therefore, at the optimal point, the energy spent for each packet monotonically decreases in the order of transmission. Thus, earlier packets are assigned larger energies and therefore, are transmitted quicker than the later ones. Therefore, this model for the delay minimization problem yields a solution which is in contrast with the principle of lazy scheduling that the model in [1] resulted in. IV. SIMULATION RESULTS We generate a short sequence of packets, with inter-arrival times d = [ ]. The first packet arrives at time t = 0. We choose a simple function to use in our simulations: fe) = 1/e, which satisfies all of the stated properties for fe). We use five algorithms, including our iterative algorithm, the versions of it with dimension relaxation, and ɛ- perturbation methods, DP based algorithm and built-in Matlab optimization functions. Simulation results indicate that DP based algorithm always converges to the solution that the built-in Matlab function finds. In Fig. 8, we observe that our iterative algorithm converges to the solution the built-in Matlab function finds. However, in Fig. 9, we observe that there is a gap between the convergence point of our iterative algorithm and the Matlab solution. We note that, at the point that our algorithm converges to, the departure time of the third packet coincides with the arrival time of the fourth packet. This means that our algorithm converges to a non-differentiable sub-optimal Overall delay Iterative algorithm Optimal solution by Matlab Iteration index Fig. 8. Overall delay as a function of the iteration index, when E = 4.8. Overall delay Iterative algorithm Dimension 3 relaxation ε pertubation Optimal solution by Matlab Iteration index Fig. 9. Overall delay as a function of the iteration index, when E = 4.5 fixed point. When we apply dimension-3 relaxation and ɛ- perturbation methods, we observe that the modified version of our algorithm escapes the sub-optimal fixed point and converges to the optimal solution. REFERENCES [1] E. Uysal-Biyikoglu, B. Prabhakar, and A. El Gamal, Energy-efficient packet transmission over a wireless link, IEEE/ACM Transactions on Networking, vol. 10, pp , [2] A. El Gamal, C. Nair, B. Prabhakar, E. Uysal-Biyikoglu, and S. Zahedi, Energy-efficient scheduling of packet transmissions over wireless networks, IEEE Infocom, vol. 3, pp , [3] E. Uysal-Biyikoglu and A. El Gamal, On adaptive transmission for energy efficiency in wireless data networks, IEEE Transactions on Information Theory, vol. 50, pp , Dec [4] R. A. Berry and R. G. Gallager, Communication over fading channels with delay constraints, IEEE Transactions on Information Theory, vol. 48, pp , May [5] T. Holliday and A. Goldsmith, Optimal power control and sourcechannel coding for delay constrained traffic over wireless channels, Proc. IEEE Int. Conf. Communications, vol. 2, pp , Apr/May [6] R. Negi and J. M. Cioffi, Delay-constrained capacity with casual feedback, IEEE Transactions on Information Theory, vol. 48, pp , Sep [7] I. Bettesh and S. Shamai, Optimal power and rate control for minimal average delay: The single-user case, IEEE Transactions on Information Theory, vol. 52, pp , Sep [8] A. Fu, E. Modiano, and J. Tsitsiklis, Optimal energy allocation for delay-constrained data transmission over a time-varying channel, IEEE Infocom, vol. 2, pp , [9] D. Bertsekas and J. Tsitsiklis, Parallel and Distributed Computation: Numericcal Methods. Athena Scientific, 1997.
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER Elif Uysal-Biyikoglu, Member, IEEE, and Abbas El Gamal, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004 3081 On Adaptive Transmission for Energy Efficiency in Wireless Data Networks Elif Uysal-Biyikoglu, Member, IEEE, Abbas El Gamal,
More informationEnergy-efficient Transmission over a Wireless Link via Lazy Packet Scheduling
Energy-efficient Transmission over a Wireless Link via Lazy Packet Scheduling Balaji Prabhakar Elif Uysal Biyikoglu and Abbas El Gamal Information Systems Laboratory Stanford University Stanford CA 35
More informationSome problems in ad hoc wireless networking. Balaji Prabhakar
Some problems in ad hoc wireless networking Balaji Prabhakar Background Example scenarios for ad hoc packet networks - sensor networks (many nodes, low data rates) - wireless LANs (fewer nodes, high data
More informationLagrangian Relaxation: An overview
Discrete Math for Bioinformatics WS 11/12:, by A. Bockmayr/K. Reinert, 22. Januar 2013, 13:27 4001 Lagrangian Relaxation: An overview Sources for this lecture: D. Bertsimas and J. Tsitsiklis: Introduction
More informationSome Optimization Trade-offs in Wireless Network Coding
Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,
More informationIEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 11, JUNE 1, Optimal Wireless Communications With Imperfect Channel State Information
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 61, NO. 11, JUNE 1, 2013 2751 Optimal Wireless Communications With Imperfect Channel State Information Yichuan Hu, Student Member, IEEE, and Alejandro Ribeiro,
More informationNovel Decentralized Coded Caching through Coded Prefetching
ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu
More informationEfficient Power Management in Wireless Communication
Efficient Power Management in Wireless Communication R.Saranya 1, Mrs.J.Meena 2 M.E student,, Department of ECE, P.S.R.College of Engineering, sivakasi, Tamilnadu, India 1 Assistant professor, Department
More informationMinimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions
Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,
More informationSurrogate Gradient Algorithm for Lagrangian Relaxation 1,2
Surrogate Gradient Algorithm for Lagrangian Relaxation 1,2 X. Zhao 3, P. B. Luh 4, and J. Wang 5 Communicated by W.B. Gong and D. D. Yao 1 This paper is dedicated to Professor Yu-Chi Ho for his 65th birthday.
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationIN distributed random multiple access, nodes transmit
414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and
More informationMedium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 6, DECEMBER 2010 1921 Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE Abstract Many existing
More informationProbabilistic Graphical Models
School of Computer Science Probabilistic Graphical Models Theory of Variational Inference: Inner and Outer Approximation Eric Xing Lecture 14, February 29, 2016 Reading: W & J Book Chapters Eric Xing @
More informationAn algorithm for Performance Analysis of Single-Source Acyclic graphs
An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs
More informationReduction of Periodic Broadcast Resource Requirements with Proxy Caching
Reduction of Periodic Broadcast Resource Requirements with Proxy Caching Ewa Kusmierek and David H.C. Du Digital Technology Center and Department of Computer Science and Engineering University of Minnesota
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More information15.082J and 6.855J. Lagrangian Relaxation 2 Algorithms Application to LPs
15.082J and 6.855J Lagrangian Relaxation 2 Algorithms Application to LPs 1 The Constrained Shortest Path Problem (1,10) 2 (1,1) 4 (2,3) (1,7) 1 (10,3) (1,2) (10,1) (5,7) 3 (12,3) 5 (2,2) 6 Find the shortest
More informationNetwork Topology Control and Routing under Interface Constraints by Link Evaluation
Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu
More informationOptimality of Periodwise Static Priority Policies in Real-time Communications
Optimality of Periodwise Static Priority Policies in Real-time Communications I-Hong Hou, Anh Truong, Santanu Chakraborty and P. R. Kumar Abstract We consider the problem of real-time communication with
More informationApplied Lagrange Duality for Constrained Optimization
Applied Lagrange Duality for Constrained Optimization Robert M. Freund February 10, 2004 c 2004 Massachusetts Institute of Technology. 1 1 Overview The Practical Importance of Duality Review of Convexity
More informationA Two-phase Distributed Training Algorithm for Linear SVM in WSN
Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear
More informationLecture 2 September 3
EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give
More informationDelay-Constrained Optimized Packet Aggregation in High-Speed Wireless Networks
Teymoori P, Yazdani N. Delay-constrained optimized packet aggregation in high-speed wireless networks. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 28(3): 525 539 May 2013. DOI 10.1007/s11390-013-1353-1
More informationImproving Connectivity via Relays Deployment in Wireless Sensor Networks
Improving Connectivity via Relays Deployment in Wireless Sensor Networks Ahmed S. Ibrahim, Karim G. Seddik, and K. J. Ray Liu Department of Electrical and Computer Engineering, and Institute for Systems
More informationPractical Lazy Scheduling in Wireless Sensor Networks. Ramana Rao Kompella and Alex C. Snoeren
Practical Lazy Scheduling in Wireless Sensor Networks Ramana Rao Kompella and Alex C. Snoeren Distributed Rate Adaptation Problem: In wireless networks (e.g., sensor nets, 802.11) radios consume significant
More informationA DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS. Eytan Modiano MIT LIDS Cambridge, MA
A DYNAMIC RESOURCE ALLOCATION STRATEGY FOR SATELLITE COMMUNICATIONS Aradhana Narula-Tam MIT Lincoln Laboratory Lexington, MA Thomas Macdonald MIT Lincoln Laboratory Lexington, MA Eytan Modiano MIT LIDS
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationLocal and Global Minimum
Local and Global Minimum Stationary Point. From elementary calculus, a single variable function has a stationary point at if the derivative vanishes at, i.e., 0. Graphically, the slope of the function
More informationStretch-Optimal Scheduling for On-Demand Data Broadcasts
Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu
More informationThe Maximum Throughput of A Wireless Multi-Hop Path
The Maximum Throughput of A Wireless Multi-Hop Path Guoqiang Mao School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia Email: guoqiang@ee.usyd.edu.au Abstract In
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3413 Relay Networks With Delays Abbas El Gamal, Fellow, IEEE, Navid Hassanpour, and James Mammen, Student Member, IEEE Abstract The
More informationIN A SEMINAL paper published in 1995, Shenker [18] discussed
1240 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 Distributed Rate Allocation for Inelastic Flows Prashanth Hande, Shengyu Zhang, and Mung Chiang, Member, IEEE Abstract A common assumption
More informationSINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC
SINGLE PASS DEPENDENT BIT ALLOCATION FOR SPATIAL SCALABILITY CODING OF H.264/SVC Randa Atta, Rehab F. Abdel-Kader, and Amera Abd-AlRahem Electrical Engineering Department, Faculty of Engineering, Port
More informationDual Subgradient Methods Using Approximate Multipliers
Dual Subgradient Methods Using Approximate Multipliers Víctor Valls, Douglas J. Leith Trinity College Dublin Abstract We consider the subgradient method for the dual problem in convex optimisation with
More informationOVER THE last decades, there has been a significant
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 13, NO. 4, AUGUST 2005 827 Non-Convex Optimization Rate Control for Multi-Class Services in the Internet Jang-Won Lee, Member, IEEE, Ravi R. Mazumdar, Fellow,
More informationMonotone Paths in Geometric Triangulations
Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More informationUtility-Based Rate Control in the Internet for Elastic Traffic
272 IEEE TRANSACTIONS ON NETWORKING, VOL. 10, NO. 2, APRIL 2002 Utility-Based Rate Control in the Internet for Elastic Traffic Richard J. La and Venkat Anantharam, Fellow, IEEE Abstract In a communication
More informationINTEGRATION of data communications services into wireless
208 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL 54, NO 2, FEBRUARY 2006 Service Differentiation in Multirate Wireless Networks With Weighted Round-Robin Scheduling and ARQ-Based Error Control Long B Le, Student
More informationOptimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4119 Optimal Delay Throughput Tradeoffs in Mobile Ad Hoc Networks Lei Ying, Member, IEEE, Sichao Yang, and R. Srikant, Fellow, IEEE
More informationEND-TO-END estimation of the spare capacity along a network
130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,
More informationOptimal network flow allocation
Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement
More informationOptimum Scheduling and Memory Management in Input Queued Switches with Finite Buffer Space
University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering March 23 Optimum Scheduling and Memory Management in Input Queued Switches with Finite
More informationJoint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks
Joint Coding/Routing Optimization for Correlated Sources in Wireless Visual Sensor Networks Chenglin Li 1, Junni Zou 2, Hongkai Xiong 1, Yongsheng Zhang 1 1 Department of Electronic Engineering, Shanghai
More informationChapter 15 Introduction to Linear Programming
Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of
More informationDelay-Optimal Probabilistic Scheduling in Green Communications with Arbitrary Arrival and Adaptive Transmission
Delay-Optimal Probabilistic Scheduling in Green Communications with Arbitrary Arrival and Adaptive Transmission Xiang Chen, Wei Chen, Joohyun Lee,andNessB.Shroff Tsinghua National Laboratory for Information
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationIN mobile wireless networks, communications typically take
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, VOL 2, NO 2, APRIL 2008 243 Optimal Dynamic Resource Allocation for Multi-Antenna Broadcasting With Heterogeneous Delay-Constrained Traffic Rui Zhang,
More informationConvex Optimization MLSS 2015
Convex Optimization MLSS 2015 Constantine Caramanis The University of Texas at Austin The Optimization Problem minimize : f (x) subject to : x X. The Optimization Problem minimize : f (x) subject to :
More information554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE
554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY 2008 Cross-Layer Optimization of MAC and Network Coding in Wireless Queueing Tandem Networks Yalin Evren Sagduyu, Member, IEEE, and
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationEnergy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks
Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com
More informationInteger Programming Theory
Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x
More informationStochastic Approximation and Transaction-Level Model for IP Network Design
Stochastic Approximation and Transaction-Level Model for IP Network Design Linhai He and Jean Walrand Department of Electrical Engineering and Computer Sciences University of California at Berkeley Berkeley,
More informationNonlinear Programming
Nonlinear Programming SECOND EDITION Dimitri P. Bertsekas Massachusetts Institute of Technology WWW site for book Information and Orders http://world.std.com/~athenasc/index.html Athena Scientific, Belmont,
More information048866: Packet Switch Architectures
048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/
More informationQueuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks
Queuing Delay and Achievable Throughput in Random Access Wireless Ad Hoc Networks Nabhendra Bisnik and Alhussein Abouzeid Rensselaer Polytechnic Institute Troy, NY bisnin@rpi.edu, abouzeid@ecse.rpi.edu
More information16.410/413 Principles of Autonomy and Decision Making
16.410/413 Principles of Autonomy and Decision Making Lecture 17: The Simplex Method Emilio Frazzoli Aeronautics and Astronautics Massachusetts Institute of Technology November 10, 2010 Frazzoli (MIT)
More informationIntroduction to Machine Learning
Introduction to Machine Learning Maximum Margin Methods Varun Chandola Computer Science & Engineering State University of New York at Buffalo Buffalo, NY, USA chandola@buffalo.edu Chandola@UB CSE 474/574
More informationThroughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks
Throughput and Fairness-Aware Dynamic Network Coding in Wireless Communication Networks Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 191
More informationMemory Placement in Network Compression: Line and Grid Topologies
ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,
More informationPrinciples of Wireless Sensor Networks. Fast-Lipschitz Optimization
http://www.ee.kth.se/~carlofi/teaching/pwsn-2011/wsn_course.shtml Lecture 5 Stockholm, October 14, 2011 Fast-Lipschitz Optimization Royal Institute of Technology - KTH Stockholm, Sweden e-mail: carlofi@kth.se
More information10. Network dimensioning
Partly based on slide material by Samuli Aalto and Jorma Virtamo ELEC-C7210 Modeling and analysis of communication networks 1 Contents Introduction Parameters: topology, routing and traffic Dimensioning
More informationThroughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions
Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions Abhishek Sinha Laboratory for Information and Decision Systems MIT MobiHoc, 2017 April 18, 2017 1 / 63 Introduction
More informationARELAY network consists of a pair of source and destination
158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper
More informationA Survey of Recent Results on Real-Time Wireless Networking
A Survey of Recent Results on Real-Time Wireless Networking I-Hong Hou CSL and Department of Computer Science University of Illinois Urbana, IL 61801, USA ihou2@illinois.edu P. R. Kumar CSL and Department
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2593 On the Throughput, Capacity, and Stability Regions of Random Multiple Access Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow,
More informationOptimizing Data Freshness, Throughput, and Delay in Multi-Server Information-Update Systems
Optimizing Data Freshness, Throughput, and Delay in Multi-Server Information-Update Systems Ahmed M. Bedewy, Yin Sun, and Ness B. Shroff Dept. of ECE, Dept. of CSE, The Ohio State University, Columbus,
More informationSINCE the publication of the seminal paper [1] by Kelly et al.
962 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 5, MAY 2006 Price-Based Distributed Algorithms for Rate-Reliability Tradeoff in Network Utility Maximization Jang-Won Lee, Member, IEEE,
More informationA Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows
1 A Joint Congestion Control, Routing, and Scheduling Algorithm in Multihop Wireless Networks with Heterogeneous Flows Phuong Luu Vo, Nguyen H. Tran, Choong Seon Hong, *KiJoon Chae Kyung H University,
More informationCollege of Computer & Information Science Fall 2007 Northeastern University 14 September 2007
College of Computer & Information Science Fall 2007 Northeastern University 14 September 2007 CS G399: Algorithmic Power Tools I Scribe: Eric Robinson Lecture Outline: Linear Programming: Vertex Definitions
More informationPRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING. 1. Introduction
PRIMAL-DUAL INTERIOR POINT METHOD FOR LINEAR PROGRAMMING KELLER VANDEBOGERT AND CHARLES LANNING 1. Introduction Interior point methods are, put simply, a technique of optimization where, given a problem
More informationOutline. Overview of ad hoc wireless networks (I) Overview of ad hoc wireless networks (II) Paper presentation Ultra-Portable Devices.
Paper presentation Ultra-Portable Devices Paper: Design Challenges for Energy-Constrained Ad Hoc Wireless Networks Andrea J. Goldsmith, Stephen B. Wicker IEEE Wireless Communication August 2002, pages
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER /$ IEEE
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 9, SEPTEMBER 2008 4081 Node-Based Optimal Power Control, Routing, Congestion Control in Wireless Networks Yufang Xi, Student Member, IEEE, Edmund M.
More informationLecture 4 Duality and Decomposition Techniques
Lecture 4 Duality and Decomposition Techniques Jie Lu (jielu@kth.se) Richard Combes Alexandre Proutiere Automatic Control, KTH September 19, 2013 Consider the primal problem Lagrange Duality Lagrangian
More informationThe Encoding Complexity of Network Coding
The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network
More informationOptimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class
Optimal per-node Rate Allocation to provide per-flow End-to-End Delay Guarantees in a Network of Routers supporting Guaranteed Service Class Aniruddha Diwan ECE Department Indian Institute of Science Bangalore
More informationEnergy-Aware Routing in Wireless Ad-hoc Networks
Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless
More informationRouting over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks
2002 Conference on Information Sciences and Systems, Princeton University, March 20-22, 2002 Routing over Parallel Queues with Time Varying Channels with Application to Satellite and Wireless Networks
More informationJoint Rate Control and Scheduling in Multihop Wireless Networks
Joint Rate Control and Scheduling in Multihop Wireless Networks Xiaojun Lin and Ness B. Shroff School of Electrical and Computer Engineering, Purdue University West Lafayette, IN 47907, U.S.A. {linx, shroff}@ecn.purdue.edu
More informationThe Prices of Packets: End-to-end delay Guarantees in Unreliable Networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. See http://creativecommons.org/licenses/by-nc-nd/3.0/ The Prices of Packets: End-to-end
More informationDynamic Control and Optimization of Buffer Size for Short Message Transfer in GPRS/UMTS Networks *
Dynamic Control and Optimization of for Short Message Transfer in GPRS/UMTS Networks * Michael M. Markou and Christos G. Panayiotou Dept. of Electrical and Computer Engineering, University of Cyprus Email:
More informationCONLIN & MMA solvers. Pierre DUYSINX LTAS Automotive Engineering Academic year
CONLIN & MMA solvers Pierre DUYSINX LTAS Automotive Engineering Academic year 2018-2019 1 CONLIN METHOD 2 LAY-OUT CONLIN SUBPROBLEMS DUAL METHOD APPROACH FOR CONLIN SUBPROBLEMS SEQUENTIAL QUADRATIC PROGRAMMING
More informationLECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION. 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach
LECTURE 13: SOLUTION METHODS FOR CONSTRAINED OPTIMIZATION 1. Primal approach 2. Penalty and barrier methods 3. Dual approach 4. Primal-dual approach Basic approaches I. Primal Approach - Feasible Direction
More informationTHERE are a number of fundamental optimization problems
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 6, DECEMBER 2007 1359 Modeling and Optimization of Transmission Schemes in Energy-Constrained Wireless Sensor Networks Ritesh Madan, Member, IEEE, Shuguang
More informationLast topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far:
Last topic: Summary; Heuristics and Approximation Algorithms Topics we studied so far: I Strength of formulations; improving formulations by adding valid inequalities I Relaxations and dual problems; obtaining
More informationTraffic Pattern Analysis in Multiprocessor System
International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 6, Number 1 (2013), pp. 145-151 International Research Publication House http://www.irphouse.com Traffic Pattern Analysis
More informationJoint Source Coding and Data Rate Adaptation for Energy Efficient Wireless Video Streaming
1710 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 10, DECEMBER 2003 Joint Source Coding and Data Rate Adaptation for Energy Efficient Wireless Video Streaming Carlos E. Luna, Associate
More informationMP-DSM: A Distributed Cross Layer Network Control Protocol
MP-DSM: A Distributed Cross Layer Network Control Protocol Daniel C. O Neill, Yan Li, and Stephen Boyd Department of Electrical Engineering Stanford University dconeill, liyan, boyd@stanford.edu Abstract
More informationRELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION
RELATIVELY OPTIMAL CONTROL: THE STATIC SOLUTION Franco Blanchini,1 Felice Andrea Pellegrino Dipartimento di Matematica e Informatica Università di Udine via delle Scienze, 208 33100, Udine, Italy blanchini@uniud.it,
More informationpacket-switched networks. For example, multimedia applications which process
Chapter 1 Introduction There are applications which require distributed clock synchronization over packet-switched networks. For example, multimedia applications which process time-sensitive information
More informationBalancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control
Balancing Transport and Physical Layers in Wireless Ad Hoc Networks: Jointly Optimal Congestion Control and Power Control Mung Chiang Electrical Engineering Department, Princeton University NRL/NATO Workshop
More informationFast-Lipschitz Optimization
Fast-Lipschitz Optimization DREAM Seminar Series University of California at Berkeley September 11, 2012 Carlo Fischione ACCESS Linnaeus Center, Electrical Engineering KTH Royal Institute of Technology
More informationMeasurement Based Routing Strategies on Overlay Architectures
Measurement Based Routing Strategies on Overlay Architectures Student: Tuna Güven Faculty: Bobby Bhattacharjee, Richard J. La, and Mark A. Shayman LTS Review February 15 th, 2005 Outline Measurement-Based
More informationOptimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks
Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,
More informationCharacterizing Improving Directions Unconstrained Optimization
Final Review IE417 In the Beginning... In the beginning, Weierstrass's theorem said that a continuous function achieves a minimum on a compact set. Using this, we showed that for a convex set S and y not
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationA NEW ALGORITHM FOR JITTER CONTROL IN WIRELESS NETWORKS FOR QUALITY OF SERVICE
Int. J. Elec&Electr.Eng&Telecoms. 2013 B Santosh Kumar et al., 2013 Research Paper ISSN 2319 2518 www.ijeetc.com Vol. 2, No. 2, April 2013 2013 IJEETC. All Rights Reserved A NEW ALGORITHM FOR JITTER CONTROL
More informationUnconstrained Optimization Principles of Unconstrained Optimization Search Methods
1 Nonlinear Programming Types of Nonlinear Programs (NLP) Convexity and Convex Programs NLP Solutions Unconstrained Optimization Principles of Unconstrained Optimization Search Methods Constrained Optimization
More information